With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so ...With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so this reality drives the conversion of paper medical records to electronic medical records.Electronic medical records are the basis for establishing a smart hospital and an important guarantee for achieving medical intelligence,and the massive amount of electronic medical record data is also an important data set for conducting research in the medical field.However,electronic medical records contain a large amount of private patient information,which must be desensitized before they are used as open resources.Therefore,to solve the above problems,data masking for Chinese electronic medical records with named entity recognition is proposed in this paper.Firstly,the text is vectorized to satisfy the required format of the model input.Secondly,since the input sentences may have a long or short length and the relationship between sentences in context is not negligible.To this end,a neural network model for named entity recognition based on bidirectional long short-term memory(BiLSTM)with conditional random fields(CRF)is constructed.Finally,the data masking operation is performed based on the named entity recog-nition results,mainly using regular expression filtering encryption and principal component analysis(PCA)word vector compression and replacement.In addi-tion,comparison experiments with the hidden markov model(HMM)model,LSTM-CRF model,and BiLSTM model are conducted in this paper.The experi-mental results show that the method used in this paper achieves 92.72%Accuracy,92.30%Recall,and 92.51%F1_score,which has higher accuracy compared with other models.展开更多
Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present...Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present study reviews and compares existing findings on speech perception and unmasking in cocktail party listening environments in English and Mandarin Chinese.The review starts with an introduction section followed by related concepts of auditory masking.The next two sections review factors that release speech perception from masking in English and Mandarin Chinese,respectively.The last section presents an overall summary of the findings with comparisons between the two languages.Future research directions with respect to the difference in literature on the reviewed topic between the two languages are also discussed.展开更多
The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acryli...The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acrylic acid with different cross linking agents were synthesised.Drug-resin complexes(DRCs)with three different ratios of drug to IERs(1:1,1:2,1:4)were prepared&evaluated for taste masking by following in vivo and in vitro methods.Human volunteers graded ADC 1:4,acrylic acid-divinyl benzene(ADC-3)resin as tasteless.Characterization studies such as FTIR,SEM,DSC,P-XRD differentiated ADC 1:4,from physical mixture(PM 1:4)and confirmed the formation of complex.In vitro drug release of ADC 1:4 showed complete release of CP within 60 min at simulated gastric fluid(SGF)i.e.pH 1.2.IPN beads were prepared with ADC 1:4 by using sodium alginate(AL)and sodium alginate-chitosan(AL-CS)for sustain release of CP at SGF pH and followed by simulated intestinal fluid(SIF i.e.pH 7.4).FTIR spectra confirmed the formation of IPN beads.The release of CP was sustain at SGF pH(<20%)whereas in SIF media it was more(>75%).The kinetic model of IPN beads showed the release of CP was non-Fickian diffusion type.展开更多
In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption per...In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption performance of the receiver can be improved when the message wavelength is greater than that of the chaotic carrier. When the wavelength offset is set to 0.12 nm, high-speed secure optical communication with a message of 2.5 Gbits/s is achieved.展开更多
The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexe...The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexes(DRCs) with three different ratios of Ofl to IERs(1:1, 1:2, 1:4) were prepared by batch method and investigated for in vivo and in vitro taste masking. DRC of methacrylic acid-divinyl benzene(MD) resin and Ofl prepared at a ratio of 1:4 was used to form IPN beads. IPN beads of MD 1:4 were prepared by following the ionic cross-linking method using sodium carboxymethyl xanthan gum(SCMXG) and SCMXG-sodium carboxymethyl cellulose(SCMXG-SCMC). IPN beads were characterized with FT-IR and further studied on sustained release of Ofl at different pH. In vivo taste masking carried out by human volunteers showed that MD 1:4 significantly reduced the bitterness of Ofl. Characterization studies such as FT-IR, DSC, P-XRD and taste masking showed that complex formation took place between drug and resin. In vitro study at gastric pH showed complete release of drug from MD 1:4 within 30 min whereas IPN beads took 5 h at gastric pH and 10 h at salivary pH for the complete release of drug. As the crosslinking increased the release kinetics changed into non-Fickian diffusion to zero-order release mechanism. MD 1:4 showed better performance for the taste masking of Ofl and IPNs beads prepared from it were found useful for the sustained release of Ofl at both the pH, indicating a versatile drug delivery system.展开更多
In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted...In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted to image content in each 8×8 block to make a balance of robust extraction and transparent embedding.The modified step-size is determined by contrast masking thresholds of Watson’s perceptual model.From a normalized crossed-correlation value between the original watermark and the detected watermark,we could observe that our method is robust to attacks of additive white Gaussian noise(AWGN),Salt and Pepper noise and Joint Photographic Experts Group(JPEG) compression than the original QIM.By taking into account the contrast insensitivity and visible thresholds of human visual system,the suggested improvement achieves a maximum embedding strength and an appropriate quantization step-size which is consistent with local values of a host signal.展开更多
In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov expon...In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks.展开更多
Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe,...Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe, is masked by a preceding tone, the masker. Forward masking展开更多
A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images. Due to specific perceptual characteristics of Synthetic Aperture Radar(SAR) i...A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images. Due to specific perceptual characteristics of Synthetic Aperture Radar(SAR) images, the watermarking algorithms with consideration of Human Vision System(HVS) modeling from optical images give poor performance when applied on SAR images. This paper examines a variety of factors affecting the noise sensitivity, and further proposes a refined pixel-wise masking approach for watermarking on SAR images. The proposed approach is applied on logarithmic transformed SAR images, and has increased the acceptable watermark embedding strength by about 6 dB to 10 dB while achieving the same levels of watermarked image visual quality. Experimental results show that this approach enhanced the perceptual invisibility of watermarking based on wavelet decomposition.展开更多
Traditional noise reduction techniques have the drawback of generating an annoying musical noise. A new scheme for speech enhancement in high noise environment is developed by considering human auditory system masking...Traditional noise reduction techniques have the drawback of generating an annoying musical noise. A new scheme for speech enhancement in high noise environment is developed by considering human auditory system masking characteristics. The new scheme considers the masking threshold of both noisy speech and the denoised one, to detect musical noise components. To make them inaudible, they are set under the noise masking threshold. The improved signal is subjected to extensive subjective and objective tests. It is ob-served that the musical noise is appreciably reduced even at very low signal to noise ratios.展开更多
To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in...To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems.The concept of quantum masking was developed along with a new quantum impossibility theorem,the quantum no-masking theorem.The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states,the number of masking participants,and error correction codes.Others have studied the relationships between maskable quantum states,the deterministic and probabilistic masking of quantum states,and the problem of probabilistic masking.Quantum masking techniques have been shown to outperform previous strategies in quantum bit commitment,quantum multi-party secret sharing,and so on.展开更多
Masked data are the system failure data when exact component causing system failure might be unknown.In this paper,the mathematical description of general masked data was presented in software reliability engineering....Masked data are the system failure data when exact component causing system failure might be unknown.In this paper,the mathematical description of general masked data was presented in software reliability engineering.Furthermore,a general maskedbased additive non-homogeneous Poisson process(NHPP) model was considered to analyze component reliability.However,the problem of masked-based additive model lies in the difficulty of estimating parameters.The maximum likelihood estimation procedure was derived to estimate parameters.Finally,a numerical example was given to illustrate the applicability of proposed model,and the immune particle swarm optimization(IPSO) algorithm was used in maximize log-likelihood function.展开更多
The use of personal protective equipment(PPE)for ophthalmologists caring for asymptomatic patients remains controversial.This commentary reviews the latest emerging evidence.This is paramountly important in shaping he...The use of personal protective equipment(PPE)for ophthalmologists caring for asymptomatic patients remains controversial.This commentary reviews the latest emerging evidence.This is paramountly important in shaping health policies in countries which is not currently recommended.展开更多
E-commerce platform financing is a new service pattern of supply chain finance.However,this pattern may bring some new issues when considering the problem of cash flow shortage and financing difficulties of small and ...E-commerce platform financing is a new service pattern of supply chain finance.However,this pattern may bring some new issues when considering the problem of cash flow shortage and financing difficulties of small and medium-sized enterprises.When enterprises use this service,they worry about the leakage of preferential wholesale price when applying the full loan amount and providing the true transaction information.Based on the model consisting of a supplier,a retailer and a cross-border e-commerce platform,the authors design a price masking strategy to prevent the retailer’s preferential wholesale price information from leakage.The authors analyze the profit of the retailer and the platform before and after adopting the price masking strategy.The authors find that the price masking strategy always benefits the retailer.Besides,the optimal profit of the retailer and the platform are both affected by the loan interest rate.Moreover,there exists a range of loan interest rates that can benefit both the retailer and the platform if the price masking strategy is adopted.The research emphasizes that platform can expand the total business volume by allowing retailers to use price masking strategy.In other words,there will be more and more retailers attracted by the strategy,which benefits the long-term growth of cross-border e-commerce platform financing.展开更多
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher...The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.展开更多
基金This research was supported by the National Natural Science Foundation of China under Grant(No.42050102)the Postgraduate Education Reform Project of Jiangsu Province under Grant(No.SJCX22_0343)Also,this research was supported by Dou Wanchun Expert Workstation of Yunnan Province(No.202205AF150013).
文摘With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so this reality drives the conversion of paper medical records to electronic medical records.Electronic medical records are the basis for establishing a smart hospital and an important guarantee for achieving medical intelligence,and the massive amount of electronic medical record data is also an important data set for conducting research in the medical field.However,electronic medical records contain a large amount of private patient information,which must be desensitized before they are used as open resources.Therefore,to solve the above problems,data masking for Chinese electronic medical records with named entity recognition is proposed in this paper.Firstly,the text is vectorized to satisfy the required format of the model input.Secondly,since the input sentences may have a long or short length and the relationship between sentences in context is not negligible.To this end,a neural network model for named entity recognition based on bidirectional long short-term memory(BiLSTM)with conditional random fields(CRF)is constructed.Finally,the data masking operation is performed based on the named entity recog-nition results,mainly using regular expression filtering encryption and principal component analysis(PCA)word vector compression and replacement.In addi-tion,comparison experiments with the hidden markov model(HMM)model,LSTM-CRF model,and BiLSTM model are conducted in this paper.The experi-mental results show that the method used in this paper achieves 92.72%Accuracy,92.30%Recall,and 92.51%F1_score,which has higher accuracy compared with other models.
文摘Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present study reviews and compares existing findings on speech perception and unmasking in cocktail party listening environments in English and Mandarin Chinese.The review starts with an introduction section followed by related concepts of auditory masking.The next two sections review factors that release speech perception from masking in English and Mandarin Chinese,respectively.The last section presents an overall summary of the findings with comparisons between the two languages.Future research directions with respect to the difference in literature on the reviewed topic between the two languages are also discussed.
文摘The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acrylic acid with different cross linking agents were synthesised.Drug-resin complexes(DRCs)with three different ratios of drug to IERs(1:1,1:2,1:4)were prepared&evaluated for taste masking by following in vivo and in vitro methods.Human volunteers graded ADC 1:4,acrylic acid-divinyl benzene(ADC-3)resin as tasteless.Characterization studies such as FTIR,SEM,DSC,P-XRD differentiated ADC 1:4,from physical mixture(PM 1:4)and confirmed the formation of complex.In vitro drug release of ADC 1:4 showed complete release of CP within 60 min at simulated gastric fluid(SGF)i.e.pH 1.2.IPN beads were prepared with ADC 1:4 by using sodium alginate(AL)and sodium alginate-chitosan(AL-CS)for sustain release of CP at SGF pH and followed by simulated intestinal fluid(SIF i.e.pH 7.4).FTIR spectra confirmed the formation of IPN beads.The release of CP was sustain at SGF pH(<20%)whereas in SIF media it was more(>75%).The kinetic model of IPN beads showed the release of CP was non-Fickian diffusion type.
文摘In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption performance of the receiver can be improved when the message wavelength is greater than that of the chaotic carrier. When the wavelength offset is set to 0.12 nm, high-speed secure optical communication with a message of 2.5 Gbits/s is achieved.
基金Council of Scientific and Industrial Research (CSIR), New Delhi, India, for providing Senior Research FellowshipCentralized Analytical Facility of CSIRCSMCRI for analytical support
文摘The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexes(DRCs) with three different ratios of Ofl to IERs(1:1, 1:2, 1:4) were prepared by batch method and investigated for in vivo and in vitro taste masking. DRC of methacrylic acid-divinyl benzene(MD) resin and Ofl prepared at a ratio of 1:4 was used to form IPN beads. IPN beads of MD 1:4 were prepared by following the ionic cross-linking method using sodium carboxymethyl xanthan gum(SCMXG) and SCMXG-sodium carboxymethyl cellulose(SCMXG-SCMC). IPN beads were characterized with FT-IR and further studied on sustained release of Ofl at different pH. In vivo taste masking carried out by human volunteers showed that MD 1:4 significantly reduced the bitterness of Ofl. Characterization studies such as FT-IR, DSC, P-XRD and taste masking showed that complex formation took place between drug and resin. In vitro study at gastric pH showed complete release of drug from MD 1:4 within 30 min whereas IPN beads took 5 h at gastric pH and 10 h at salivary pH for the complete release of drug. As the crosslinking increased the release kinetics changed into non-Fickian diffusion to zero-order release mechanism. MD 1:4 showed better performance for the taste masking of Ofl and IPNs beads prepared from it were found useful for the sustained release of Ofl at both the pH, indicating a versatile drug delivery system.
基金supports of China NNSF(Grant No.60472063. 60325310)GDNSF/GDCNLF(04020074/ CN200402)
文摘In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted to image content in each 8×8 block to make a balance of robust extraction and transparent embedding.The modified step-size is determined by contrast masking thresholds of Watson’s perceptual model.From a normalized crossed-correlation value between the original watermark and the detected watermark,we could observe that our method is robust to attacks of additive white Gaussian noise(AWGN),Salt and Pepper noise and Joint Photographic Experts Group(JPEG) compression than the original QIM.By taking into account the contrast insensitivity and visible thresholds of human visual system,the suggested improvement achieves a maximum embedding strength and an appropriate quantization step-size which is consistent with local values of a host signal.
基金This work was supported by the National Natural Science Foundation of China(61203004)the Natural Science Foundation of Heilongjiang Province(F201220)the Heilongjiang Provincial Natural Science Foundation of Joint Guidance Project(LH2020F022).
文摘In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks.
文摘Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe, is masked by a preceding tone, the masker. Forward masking
文摘A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images. Due to specific perceptual characteristics of Synthetic Aperture Radar(SAR) images, the watermarking algorithms with consideration of Human Vision System(HVS) modeling from optical images give poor performance when applied on SAR images. This paper examines a variety of factors affecting the noise sensitivity, and further proposes a refined pixel-wise masking approach for watermarking on SAR images. The proposed approach is applied on logarithmic transformed SAR images, and has increased the acceptable watermark embedding strength by about 6 dB to 10 dB while achieving the same levels of watermarked image visual quality. Experimental results show that this approach enhanced the perceptual invisibility of watermarking based on wavelet decomposition.
文摘Traditional noise reduction techniques have the drawback of generating an annoying musical noise. A new scheme for speech enhancement in high noise environment is developed by considering human auditory system masking characteristics. The new scheme considers the masking threshold of both noisy speech and the denoised one, to detect musical noise components. To make them inaudible, they are set under the noise masking threshold. The improved signal is subjected to extensive subjective and objective tests. It is ob-served that the musical noise is appreciably reduced even at very low signal to noise ratios.
基金This work was supported by the innovation and entrepreneurship training program of Nanjing University of Information Science&Technology(No.202010300212).
文摘To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems.The concept of quantum masking was developed along with a new quantum impossibility theorem,the quantum no-masking theorem.The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states,the number of masking participants,and error correction codes.Others have studied the relationships between maskable quantum states,the deterministic and probabilistic masking of quantum states,and the problem of probabilistic masking.Quantum masking techniques have been shown to outperform previous strategies in quantum bit commitment,quantum multi-party secret sharing,and so on.
基金Technology Foundation of Guizhou Province,China(No.QianKeHeJZi[2015]2064)Scientific Research Foundation for Advanced Talents in Guizhou Institue of Technology and Science,China(No.XJGC20150106)Joint Foundation of Guizhou Province,China(No.QianKeHeLHZi[2015]7105)
文摘Masked data are the system failure data when exact component causing system failure might be unknown.In this paper,the mathematical description of general masked data was presented in software reliability engineering.Furthermore,a general maskedbased additive non-homogeneous Poisson process(NHPP) model was considered to analyze component reliability.However,the problem of masked-based additive model lies in the difficulty of estimating parameters.The maximum likelihood estimation procedure was derived to estimate parameters.Finally,a numerical example was given to illustrate the applicability of proposed model,and the immune particle swarm optimization(IPSO) algorithm was used in maximize log-likelihood function.
文摘The use of personal protective equipment(PPE)for ophthalmologists caring for asymptomatic patients remains controversial.This commentary reviews the latest emerging evidence.This is paramountly important in shaping health policies in countries which is not currently recommended.
基金supported by the Key Program of National Natural Science Foundation of China under Grant No.71831007the General Program of National Natural Science Foundation of China under Grant Nos.72071085 and 71871166+1 种基金High-End Foreign Expert Recruitment Plan under Grant No.G2022154004LHuazhong University of Science and Technology Double First-Class Funds for Humanities and Social Sciences under Grant No.2021WKFZZX008.
文摘E-commerce platform financing is a new service pattern of supply chain finance.However,this pattern may bring some new issues when considering the problem of cash flow shortage and financing difficulties of small and medium-sized enterprises.When enterprises use this service,they worry about the leakage of preferential wholesale price when applying the full loan amount and providing the true transaction information.Based on the model consisting of a supplier,a retailer and a cross-border e-commerce platform,the authors design a price masking strategy to prevent the retailer’s preferential wholesale price information from leakage.The authors analyze the profit of the retailer and the platform before and after adopting the price masking strategy.The authors find that the price masking strategy always benefits the retailer.Besides,the optimal profit of the retailer and the platform are both affected by the loan interest rate.Moreover,there exists a range of loan interest rates that can benefit both the retailer and the platform if the price masking strategy is adopted.The research emphasizes that platform can expand the total business volume by allowing retailers to use price masking strategy.In other words,there will be more and more retailers attracted by the strategy,which benefits the long-term growth of cross-border e-commerce platform financing.
基金the Hunan Provincial Natrual Science Foundation of China(2022JJ30103)“the 14th Five-Year”Key Disciplines and Application Oriented Special Disciplines of Hunan Province(Xiangjiaotong[2022]351)the Science and Technology Innovation Program of Hunan Province(2016TP1020).
文摘The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.